Marknadens största urval
Snabb leverans

Böcker utgivna av Elsevier Science & Technology

Filter
Filter
Sortera efterSortera Populära
  • av Stelios (John Webb Jennings Chair in Engineering Kyriakides
    1 609

    Mechanics of Offshore Pipelines, Second Edition, Volume One: Buckling and Collapse gives engineers fundamental knowledge on principles surrounding the mechanical behavior of pipelines and long tubular structures in the oil and gas industry. Addressing common challenges pertaining to buckling and collapse under various offshore loads, the authors go through each challenge experimentally, with supporting and analyzing data to present the main limits encountered. Helpful to both the practicing engineer and the graduate level, the combined effort of analysis supplemented with numerical modeling helps engineers design procedures and guidelines to reproduce the best solution or solve problems using a nonlinear finite element code. Custom formulations are also included to help users gain a deeper understanding of each challenge. Rounding out with helpful appendices, including a glossary of terms, this book continues to deliver critical research and data to engineers that need to design, install and maintain efficient and safe offshore pipelines.

  •  
    1 819

    Artificial Intelligence-Based Brain Computer Interface provides concepts of AI for modelling of non-invasive modalities of medical signals such as EEG, MRI, and FMRI. These modalities and their AI-based analysis are employed in BCI and related applications. This can help to improve the healthcare system through detection, identification, predication, analysis and classification of disease, management of chronic conditions, and delivery of health services. Artificial Intelligence-Based Brain Computer Interface emphasizes the real challenges in non-invasive input due to the complex nature of the human brain and for a variety of applications for analysis, classification and identification of different mental states. Each chapter starts with a description of a non-invasive input example and the need and motivation of the associated AI methods, along with discussions to connect the technology through BCI. Major topics include different AI methods/techniques such as Deep Neural Networks and Machine Learning algorithms for different non-invasive modalities such as EEG, MRI, FMRI for improving the diagnosis and prognosis of numerous disorders of the nervous system, cardiovascular system, musculoskeletal system, respiratory system and various organs of the body. The book also covers applications of AI in management of chronic condition, databases and delivery of health services. Various brain image modalities are analyzed and capabilities of the human brain will be exploited in BCI applications and case studies. The book presents AI methods for solving real-world problems and challenges in BCI and healthcare systems with the help of appropriate case studies and research results. Provides readers with an understanding of the key applications of Artificial Intelligence to Brain-Computer Interface for acquisition and modelling of non-invasive biomedical signal and image modalities for various conditions and disorders Integrates recent advancements of Artificial Intelligence to the evaluation of large amounts of clinical data for early detection of disorders such as Epilepsy, Alcoholism, Sleep Apnea, motor-imagery tasks classification, and others Provides readers with illustrative examples of how Artificial Intelligence can be applied to Brain-Computer Interface, including a wide range of case studies in predicting and classification of neurological disorders

  •  
    2 745,-

    Covers a range of conceptual, epistemological and methodological issues in the philosophy of science raised by reflection upon medical science and practice. This title includes chapters that examine such general meta-scientific concepts as discovery, reduction, theories and models, causal inference and scientific realism.

  • av Vladimir S (Retired Professor in Separation Science & Technology Kislik
    2 669,-

    Provides an overview of both solvent extraction separation techniques and the competitive complexation/solvation theory. This book provides a key for a preliminary quantitative prediction of suitable extraction systems without experimentation, thus saving researchers time and resources. It analyzes classical and competitive models and techniques.

  • av Juergen H. (Montanuniversitat Schon
    2 245,-

    Presents a symbiosis of a brief description of physical fundamentals of rock properties (based on typical experimental results and relevant theories and models) with a guide for practical use of different theoretical concepts. This title also presents the problem of relationships between petrophysical parameters based on various model concepts.

  • av Charles Tupper
    1 005

    Data is an expensive and expansive asset. Information capture has forced storage capacity from megabytes to terabytes, exabytes and, pretty soon, zetabytes of data. This title explains the principles underlying data architecture, how data evolves with organizations, and the challenges organizations face in structuring and managing their data.

  •  
    3 325

    Provides readers with trends and achievements in magnetism. This title includes topical review articles with a description given in graphical as well as in tabular form, emphasing on the discussion of the experimental material in the framework of physics, chemistry and material science.

  • av S.E. (DFH Jorgensen
    1 235,-

    Presents an introduction to ecological modelling. This title explains the concepts and processes involved in ecological modelling, presents the developments in the field and provides readers with the tools to construct their own models.

  •  
    2 319,-

    Focuses on the fundamental concepts of agricultural economics. This volume examines the developments in human resources and technology mastery. It considers the processes and impact of invention and innovation in this field. It examines the effects of market forces and analyses the economics of our changing natural resources.

  • av William (Technical Advisor (Retired) Chevron Lyons
    1 505,-

    Covers properties of hydrocarbon mixtures, flow natural flow of fluids, natural flow performance, artificial lift methods and corrosion and scaling. This book provides engineers with a basis for understanding important concepts such a flow phenomena, hydrate formation, pressure (surge) waves, or high viscosity liquid flow failure.

  • av Joe (Independent Consultant Celko
    975,-

    Demonstrates the thought processes that are involved in attacking a problem from an SQL perspective to help advanced database programmers solve the puzzles that you frequently face. This book presents a collection of SQL puzzles with a variety of solutions and explanations.

  • av Mohamed A. (Department of Chemical Engineering Fahim
    3 645,-

    Presents an introduction to refinery engineering topics, from basic concepts and unit operations to overall refinery economics, planning and control. Based on the fundamentals of thermodynamics and kinetics, this text develops the scientific background needed to understand refinery operations.

  • av Rajiv (Nortel Networks) Ramaswami
    1 379,-

    Offers information on optical networking technologies and techniques. This book discusses componentry and transmission with an emphasis on practical networking issues that affect organizations as they evaluate, deploy, or develop optical networks.

  • av Jon S. (Principal Consultant Wilson
    1 045,-

    A guide to Test and Measurement.

  • av Joe (Independent Consultant Celko
    545,-

    Perfectly intelligent programmers often struggle when forced to work with SQL. Why? This title intends to change the way you think about the problems you solve with SQL programs. Focusing on three key table-based techniques, it reveals their power through detailed examples and explanations.

  • av Jean J. (Author and President of Micrium Labrosse
    1 165,-

    Embedded software is present everywhere - from a garage door opener to implanted medical devices to multicore computer systems. This book covers the development and testing of embedded software from many different angles and using different programming languages.

  • av Graham Pulford
    1 065

    Surveys and explains the technical area of high security locks. This book presents over 100 different locks, organized into 6 basic types. Each chapter introduces the necessary concepts in a historical perspective and further categorizes the locks.

  • av Clifford (Distinguished Research Professor Bragdon
    1 305,-

    Insecure transportation systems are costing our worldwide mobility-based economy as much as 6 per cent of GDP annually. This title examines this problem in a comprehensive manner and addresses security-based technologies and solutions to minimize risk. It covers air, sea, roadway, rail and public transport modes.

  • av Marc (Marconi Product Development Institute Annacchino
    1 415,-

    Containing case examples, organizational analysis and project planning tools, this book looks at that longer, organizational view of product development, and how that view can improve product development cycle times and better take advantage of new market opportunities.

  • av Brian (Strategic Design Services Gouin
    725,-

    Suitable for the practicing or aspiring design consultant, this title brings you step by step through the process of becoming a security consultant, describing how to start the business, market services, write proposals, determine fees, and write a report. It focuses on consulting in security design, not security management.

  •  
    985,-

    A companion to "Analog Circuit Design: Art, Science, and Personalities", this volume presents viewpoints on subjects related to analog circuit design. It includes visualizing operation of analog circuits. It also describes troubleshooting for optimum circuit performance, and demonstrates how to produce a saleable product.

  • av Gerald L. Kovacich
    1 145

    Security metrics is the application of quantitative, statistical, and/or mathematical analyses to measuring security functional trends and workload. This title provides basic guidance to security professionals so that they can measure the costs of their assets protection program - their security program - as well as its successes and failures.

  •  
    3 415

    Set theory is an autonomous and sophisticated field of mathematics that is extremely successful at analyzing mathematical propositions and gauging their consistency strength. This handbook covers the rich history of scientific turning points in set theory, providing fresh insights and points of view.

  •  
    1 999,-

    Presents the essays on the work in social choice theory and welfare economics. This title discusses the historical background of social choice theory, the vistas opened by Arrow's "Social Choice and Individual Values", the famous 'socialist planning' controversy, and the theoretical and practical significance of social choice theory.

  • av Lawrence Fennelly
    775,-

    By covering the essential tips and techniques for investigators, this work includes anecdotes, case studies, and documented procedures. It is intended for those interested in investigations, and also for the readers in and out of the law enforcement field.

  • av Martin (Courant Institute of Mathematical Sciences of New York University Davis
    1 045,-

    Covers the key areas of computer science, including recursive function theory, formal languages, and automata. This book is divided into five parts: Computability, Grammars and Automata, Logic, Complexity, and Unsolvability. It also covers in a variety of different arrangements automata theory, computational logic, and complexity theory.

  • av Jack E. (Chief Technology Officer Olson
    969,-

    Corporate data is important as companies continue to find new ways to use it. This book deals with assessing the quality of corporate data and improving its accuracy using the data profiling method. It explains data profiling and shows how it fits into the larger picture of data quality.

  • av Carl (Security Consultant Roper
    1 339,-

    Describes the risk management methodology as a specific process, a theory, or a procedure for determining your assets, vulnerabilities, and threats and how security professionals can protect them. This book addresses a systematic approach to logical decision-making about the allocation of scarce security resources.

  •  
    2 369,-

    Takes stock of the main empirical findings across a spectrum of corporate finance issues, ranging from econometric methodology, to raising capital and capital structure choice, and to managerial incentives and corporate investment behavior.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.